Approved algorithmic security enhancement of stream cipher for advanced mobile communications

ABSTRACT Confidentiality and integrity processes are based on SNOW and ZUC algorithms. These standardized algorithms are designed by the 3rd Generation Partnership Project (3GPP) for advanced mobile communication systems. Each algorithm has two S-boxes in its nonlinear layer structure. This paper proposes three different approaches to enhance the security level of both algorithms. The first approach aims to select the best combination of two S-boxes in the nonlinear part of each algorithm. Results showed that the best randomness properties are achieved by combining the Feistel structure (S1-box) and Rijndael (S2-box) in the SNOW algorithm and New Rijndael (S1-box) and Rijndael (S2-box) in the ZUC algorithm. The second approach aims to increase the nonlinearity and complexity of these algorithms by selecting a strong S-box to cascade the best-existing two S-boxes for both algorithms. The third approach is an extension of the former, based on a dynamic reform of such S-boxes as a function of the “Authentication Token” to increase the computational complexity of the upgraded two algorithms. These proposed upgrades are simulated by C language and tested successfully for their statistical properties using the standard NIST SP 800-22 test suite.

[1]  Irene Marquez Corbella,et al.  Fault Analysis of the Stream Cipher Snow 3G , 2009, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).

[2]  Risto M. Hakala,et al.  Consecutive S-box Lookups: A Timing Attack on SNOW 3G , 2010, ICICS.

[3]  Israel Koren,et al.  Workshop on fault diagnosis and tolerance in cryptography , 2004, International Conference on Dependable Systems and Networks, 2004.

[4]  Amr M. Youssef,et al.  On the sliding property of SNOW 3 G and SNOW 2.0 , 2011, IET Inf. Secur..

[5]  Taraneh Eghlidos,et al.  Improved Heuristic guess and determine attack on SNOW 3G stream cipher , 2014, 7'th International Symposium on Telecommunications (IST'2014).

[6]  Mufeed Al Mashrafi A different algebraic analysis of the ZUC stream cipher , 2011, SIN 2011.

[7]  Bin Zhang,et al.  Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+) , 2010, ACNS.

[8]  Tao Huang,et al.  Differential Attacks against Stream Cipher ZUC , 2012, ASIACRYPT.

[9]  Camel Tanougast,et al.  Combined and Robust SNOW-ZUC Algorithm Based on Chaotic System , 2018, 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security).

[10]  Jie Cui,et al.  AN IMPROVED AES S-BOX AND ITS PERFORMANCE ANALYSIS , 2011 .

[11]  Run-hua Shi,et al.  Generation and Optimization of Rijndael S-box Equation System , 2014 .

[12]  Camel Tanougast,et al.  FPGA implementation of an enhanced SNOW-3G stream cipher based on a hyperchaotic system , 2017, 2017 4th International Conference on Control, Decision and Information Technologies (CoDIT).

[13]  Talaat A. Elgarf,et al.  Modifying authentication techniques in mobile communication systems , 2014, 2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[14]  Mufeed Juma AlMashrafi A different algebraic analysis of the ZUC stream cipher , 2011, SIN '11.

[15]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[16]  Camel Tanougast,et al.  Digital Implementation of an Improved LTE Stream Cipher Snow-3G Based on Hyperchaotic PRNG , 2017, Secur. Commun. Networks.